A holistic and proactive approach to forecasting cyber threats

被引:14
作者
Almahmoud, Zaid [1 ]
Yoo, Paul D. [1 ]
Alhussein, Omar [2 ]
Farhat, Ilyas [3 ]
Damiani, Ernesto [4 ,5 ]
机构
[1] Univ London Birkbeck Coll, Dept Comp Sci & Informat Syst, London, England
[2] Huawei Technol Canada, Ottawa, ON, Canada
[3] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON, Canada
[4] Univ Milan, Dept Comp Sci, Milan, Italy
[5] Khalifa Univ, Ctr Cyber Phys Syst C2PS, Abu Dhabi, U Arab Emirates
关键词
PREDICTION; NETWORK;
D O I
10.1038/s41598-023-35198-1
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Traditionally, cyber-attack detection relies on reactive, assistive techniques, where pattern-matching algorithms help human experts to scan system logs and network traffic for known virus or malware signatures. Recent research has introduced effective Machine Learning (ML) models for cyber-attack detection, promising to automate the task of detecting, tracking and blocking malware and intruders. Much less effort has been devoted to cyber-attack prediction, especially beyond the short-term time scale of hours and days. Approaches that can forecast attacks likely to happen in the longer term are desirable, as this gives defenders more time to develop and share defensive actions and tools. Today, long-term predictions of attack waves are mostly based on the subjective perceptiveness of experienced human experts, which can be impaired by the scarcity of cyber-security expertise. This paper introduces a novel ML-based approach that leverages unstructured big data and logs to forecast the trend of cyber-attacks at a large scale, years in advance. To this end, we put forward a framework that utilises a monthly dataset of major cyber incidents in 36 countries over the past 11 years, with new features extracted from three major categories of big data sources, namely the scientific research literature, news, blogs, and tweets. Our framework not only identifies future attack trends in an automated fashion, but also generates a threat cycle that drills down into five key phases that constitute the life cycle of all 42 known cyber threats.
引用
收藏
页数:15
相关论文
共 55 条
[21]   WHERE IS RUSSIA'S CYBERWAR? RESEARCHERS DECIPHER ITS STRATEGY [J].
Gibney, Elizabeth .
NATURE, 2022, 603 (7903) :775-776
[22]  
Goyal P, 2018, Arxiv, DOI arXiv:1806.03342
[23]   Stock Prediction based on Bayesian-LSTM [J].
Huang, Biao ;
Ding, Qiao ;
Sun, Guozi ;
Li, Huakang .
PROCEEDINGS OF 2018 10TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND COMPUTING (ICMLC 2018), 2018, :128-133
[24]   Predictive methods in cyber defense: Current experience and research challenges [J].
Husak, Martin ;
Bartos, Vaclav ;
Sokol, Pavol ;
Gajdos, Andrej .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 115 :517-530
[25]   AIDA Framework: Real-Time Correlation and Prediction of Intrusion Detection Alerts [J].
Husak, Martin ;
Kaspar, Jaroslav .
14TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2019), 2019,
[26]  
Jia P., 2022, SCI REP-UK, V12
[27]   Highly accurate protein structure prediction with AlphaFold [J].
Jumper, John ;
Evans, Richard ;
Pritzel, Alexander ;
Green, Tim ;
Figurnov, Michael ;
Ronneberger, Olaf ;
Tunyasuvunakool, Kathryn ;
Bates, Russ ;
Zidek, Augustin ;
Potapenko, Anna ;
Bridgland, Alex ;
Meyer, Clemens ;
Kohl, Simon A. A. ;
Ballard, Andrew J. ;
Cowie, Andrew ;
Romera-Paredes, Bernardino ;
Nikolov, Stanislav ;
Jain, Rishub ;
Adler, Jonas ;
Back, Trevor ;
Petersen, Stig ;
Reiman, David ;
Clancy, Ellen ;
Zielinski, Michal ;
Steinegger, Martin ;
Pacholska, Michalina ;
Berghammer, Tamas ;
Bodenstein, Sebastian ;
Silver, David ;
Vinyals, Oriol ;
Senior, Andrew W. ;
Kavukcuoglu, Koray ;
Kohli, Pushmeet ;
Hassabis, Demis .
NATURE, 2021, 596 (7873) :583-+
[28]   Security in IoT Mesh Networks Based on Trust Similarity [J].
Kavitha, Athota ;
Reddy, Vijender Busi ;
Singh, Ninni ;
Gunjan, Vinit Kumar ;
Lakshmanna, Kuruva ;
Khan, Arfat Ahmad ;
Wechtaisong, Chitapong .
IEEE ACCESS, 2022, 10 :121712-121724
[29]   ATiPreTA: AN Analytical Model for Time-Dependent Prediction of Terrorist Attacks [J].
Kebir, Oussama ;
Nouaouri, Issam ;
Rejeb, Lilia ;
Ben Said, Lamjed .
INTERNATIONAL JOURNAL OF APPLIED MATHEMATICS AND COMPUTER SCIENCE, 2022, 32 (03) :495-510
[30]  
Kingma DP, 2014, ADV NEUR IN, V27